IEEE Communications Surveys and Tutorials最新文献

筛选
英文 中文
Frequency Selective Surface Toward 6G Communication Systems: A Contemporary Survey 面向 6G 通信系统的频率选择性表面:当代调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-23 DOI: 10.1109/COMST.2024.3369250
Xuehan Chen;Jingjing Tan;Litian Kang;Fengxiao Tang;Ming Zhao;Nei Kato
{"title":"Frequency Selective Surface Toward 6G Communication Systems: A Contemporary Survey","authors":"Xuehan Chen;Jingjing Tan;Litian Kang;Fengxiao Tang;Ming Zhao;Nei Kato","doi":"10.1109/COMST.2024.3369250","DOIUrl":"10.1109/COMST.2024.3369250","url":null,"abstract":"Frequency selective surfaces (FSSs) have attracted extensive attention for suppressing interference and improving channel quality and coverage by selectively transmitting or directionally reflecting electromagnetic waves in a specific frequency range in wireless communication networks. Therefore, FSS technology is considered to be another candidate after intelligent reflective surfaces (IRSs) in the sixth generation (6G) communication systems. In this paper, we provide a comprehensive investigation of the theory, design, and classification of FSS, and a contemporary overview of its vision and current applications in future 6G networks, as well as some emerging use cases of FSSs in 6G networks. Then, we describe the fundamentals and design methods of FSS from architecture, performance metrics, and experimental analysis methods and classify the relevant papers according to the FSS applications. Moreover, we review systematically the frequency selection characteristics, reflection, transmission, and absorption properties of FSS, and discuss the corresponding communication models. Additionally, we provide an overview of the vision and requirements for FSS-assisted 6G networks and summarize the FSS communication architecture and performance analysis towards 6G networks. Since the IRS technology is another metasurface candidate for 6G networks, we compare and review them with those for IRS-assisted 6G networks. Furthermore, we review some emerging use cases in 6G networks and present a new use case of adaptive spectrum allocation based on FSS. Finally, based on an extensive literature review and common weaknesses of FSS extant literature, we offer several challenges and some potential research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet 量子安全直接通信的演变:通往秦互联网之路
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-19 DOI: 10.1109/COMST.2024.3367535
Dong Pan;Gui-Lu Long;Liuguo Yin;Yu-Bo Sheng;Dong Ruan;Soon Xin Ng;Jianhua Lu;Lajos Hanzo
{"title":"The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet","authors":"Dong Pan;Gui-Lu Long;Liuguo Yin;Yu-Bo Sheng;Dong Ruan;Soon Xin Ng;Jianhua Lu;Lajos Hanzo","doi":"10.1109/COMST.2024.3367535","DOIUrl":"10.1109/COMST.2024.3367535","url":null,"abstract":"Communication security has to evolve to a higher plane in the face of the threat from the massive computing power of the emerging quantum computers. Quantum secure direct communication (QSDC) constitutes a promising branch of quantum communication, which is provably secure and overcomes the threat of quantum computing, whilst conveying secret messages directly via the quantum channel. In this survey, we highlight the motivation and the status of QSDC research with special emphasis on its theoretical basis and experimental verification. We will detail the associated point-to-point communication protocols and show how information is protected and transmitted. Finally, we discuss the open challenges as well as the future trends of QSDC networks, emphasizing again that QSDC is not a pure quantum key distribution (QKD) protocol, but a fully-fledged secure communication scheme.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10440135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Deep Learning to Strengthen the Cyber-Resilience of Renewable Energy Supply Chains: A Survey 利用深度学习加强可再生能源供应链的网络韧性:调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-12 DOI: 10.1109/COMST.2024.3365076
Malka N. Halgamuge
{"title":"Leveraging Deep Learning to Strengthen the Cyber-Resilience of Renewable Energy Supply Chains: A Survey","authors":"Malka N. Halgamuge","doi":"10.1109/COMST.2024.3365076","DOIUrl":"10.1109/COMST.2024.3365076","url":null,"abstract":"Deep learning shows immense potential for strengthening the cyber-resilience of renewable energy supply chains. However, research gaps in comprehensive benchmarks, real-world model evaluations, and data generation tailored to the renewable domain persist. This study explores applying state-of-the-art deep learning techniques to secure renewable supply chains, drawing insights from over 300 publications. We aim to provide an updated, rigorous analysis of deep learning applications in this field to guide future research. We systematically review literature spanning 2020–2023, retrieving relevant articles from major databases. We examine deep learning’s role in intrusion/anomaly detection, supply chain cyberattack detection frameworks, security standards, historical attack analysis, data management strategies, model architectures, and supply chain cyber datasets. Our analysis demonstrates deep learning enables renewable supply chain anomaly detection by processing massively distributed data. We highlight crucial model design factors, including accuracy, adaptation capability, communication security, and resilience to adversarial threats. Comparing 18 major historical attacks informs risk analysis. We also showcase potential deep learning architectures, evaluating their relative strengths and limitations in security applications. Moreover, our review emphasizes best practices for renewable data curation, considering quality, labeling, access efficiency, and governance. Effective deep learning integration necessitates tailored benchmarks, model tuning guidance, and renewable energy data generation. Our multi-dimensional analysis motivates focused efforts on enhancing detection explanations, securing communications, continually retraining models, and establishing standardized assessment protocols. Overall, we provide a comprehensive roadmap to progress renewable supply chain cyber-resilience leveraging deep learning’s immense potential.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Tutorial on Environment-Aware Communications via Channel Knowledge Map for 6G 通过 6G 信道知识图谱实现环境感知通信教程
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-09 DOI: 10.1109/COMST.2024.3364508
Yong Zeng;Junting Chen;Jie Xu;Di Wu;Xiaoli Xu;Shi Jin;Xiqi Gao;David Gesbert;Shuguang Cui;Rui Zhang
{"title":"A Tutorial on Environment-Aware Communications via Channel Knowledge Map for 6G","authors":"Yong Zeng;Junting Chen;Jie Xu;Di Wu;Xiaoli Xu;Shi Jin;Xiqi Gao;David Gesbert;Shuguang Cui;Rui Zhang","doi":"10.1109/COMST.2024.3364508","DOIUrl":"10.1109/COMST.2024.3364508","url":null,"abstract":"Sixth-generation (6G) mobile communication networks are expected to have dense infrastructures, large antenna size, wide bandwidth, cost-effective hardware, diversified positioning methods, and enhanced intelligence. Such trends bring both new challenges and opportunities for the practical design of 6G. On one hand, acquiring channel state information (CSI) in real time for all wireless links becomes quite challenging in 6G. On the other hand, there would be numerous data sources in 6G containing high-quality location-tagged channel data, e.g., the estimated channels or beams between base station (BS) and user equipment (UE), making it possible to better learn the local wireless environment. By exploiting this new opportunity and for tackling the CSI acquisition challenge, there is a promising paradigm shift from the conventional environment-unaware communications to the new environment-aware communications based on the novel approach of channel knowledge map (CKM). This article aims to provide a comprehensive overview on environment-aware communications enabled by CKM to fully harness its benefits for 6G. First, the basic concept of CKM is presented, followed by the comparison of CKM with various existing channel inference techniques. Next, the main techniques for CKM construction are discussed, including both environment model-free and environment model-assisted approaches. Furthermore, a general framework is presented for the utilization of CKM to achieve environment-aware communications, followed by some typical CKM-aided communication scenarios. Finally, important open problems in CKM research are highlighted and potential solutions are discussed to inspire future work.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Authentication and Security Design in the Machine Learning Era 机器学习时代的物理层认证和安全设计
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-08 DOI: 10.1109/COMST.2024.3363639
Tiep M. Hoang;Alireza Vahid;Hoang Duong Tuan;Lajos Hanzo
{"title":"Physical Layer Authentication and Security Design in the Machine Learning Era","authors":"Tiep M. Hoang;Alireza Vahid;Hoang Duong Tuan;Lajos Hanzo","doi":"10.1109/COMST.2024.3363639","DOIUrl":"10.1109/COMST.2024.3363639","url":null,"abstract":"Security at the physical layer (PHY) is a salient research topic in wireless systems, and machine learning (ML) is emerging as a powerful tool for providing new data-driven security solutions. Therefore, the application of ML techniques to the PHY security is of crucial importance in the landscape of more and more data-driven wireless services. In this context, we first summarize the family of bespoke ML algorithms that are eminently suitable for wireless security. Then, we review the recent progress in ML-aided PHY security, where the term “PHY security” is classified into two different types: i) PHY authentication and ii) secure PHY transmission. Moreover, we treat NNs as special types of ML and present how to deal with PHY security optimization problems using NNs. Finally, we identify some major challenges and opportunities in tackling PHY security challenges by applying carefully tailored ML tools.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey 无线联合学习的数据和模型中毒后门攻击及防御机制:全面调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-07 DOI: 10.1109/COMST.2024.3361451
Yichen Wan;Youyang Qu;Wei Ni;Yong Xiang;Longxiang Gao;Ekram Hossain
{"title":"Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey","authors":"Yichen Wan;Youyang Qu;Wei Ni;Yong Xiang;Longxiang Gao;Ekram Hossain","doi":"10.1109/COMST.2024.3361451","DOIUrl":"10.1109/COMST.2024.3361451","url":null,"abstract":"Due to the greatly improved capabilities of devices, massive data, and increasing concern about data privacy, Federated Learning (FL) has been increasingly considered for applications to wireless communication networks (WCNs). Wireless FL (WFL) is a distributed method of training a global deep learning model in which a large number of participants each train a local model on their training datasets and then upload the local model updates to a central server. However, in general, non-independent and identically distributed (non-IID) data of WCNs raises concerns about robustness, as a malicious participant could potentially inject a “backdoor” into the global model by uploading poisoned data or models over WCN. This could cause the model to misclassify malicious inputs as a specific target class while behaving normally with benign inputs. This survey provides a comprehensive review of the latest backdoor attacks and defense mechanisms. It classifies them according to their targets (data poisoning or model poisoning), the attack phase (local data collection, training, or aggregation), and defense stage (local training, before aggregation, during aggregation, or after aggregation). The strengths and limitations of existing attack strategies and defense mechanisms are analyzed in detail. Comparisons of existing attack methods and defense designs are carried out, pointing to noteworthy findings, open challenges, and potential future research directions related to security and privacy of WFL.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Quantum Internet Protocols From a Layered Perspective 分层视角下的量子互联网协议概览
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-05 DOI: 10.1109/COMST.2024.3361662
Yuan Li;Hao Zhang;Chen Zhang;Tao Huang;F. Richard Yu
{"title":"A Survey of Quantum Internet Protocols From a Layered Perspective","authors":"Yuan Li;Hao Zhang;Chen Zhang;Tao Huang;F. Richard Yu","doi":"10.1109/COMST.2024.3361662","DOIUrl":"10.1109/COMST.2024.3361662","url":null,"abstract":"With the development of quantum technologies, the quantum Internet has demonstrated unique applications beyond the classical Internet and has been investigated extensively in recent years. In the construction of conventional Internet software, the protocol stack is the core architecture for coordinating modules. How to design a protocol stack for the quantum Internet is a challenging problem. In this paper, we systematically review the latest developments in quantum Internet protocols from the perspective of protocol stack layering. By summarizing and analyzing the progress in each layer’s protocols, we reveal the current research status and connections among the layers. Our work provides readers with a comprehensive understanding of the quantum Internet and can help support researchers focusing on a single layer to better define the functions that the layer should possess and optimize related protocols. This approach enables all layers to work better together based on an understanding of the other layers.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Beam Management for mmWave and THz Communications Towards 6G 面向 6G 的毫米波和太赫兹通信波束管理概览
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-05 DOI: 10.1109/COMST.2024.3361991
Qing Xue;Chengwang Ji;Shaodan Ma;Jiajia Guo;Yongjun Xu;Qianbin Chen;Wei Zhang
{"title":"A Survey of Beam Management for mmWave and THz Communications Towards 6G","authors":"Qing Xue;Chengwang Ji;Shaodan Ma;Jiajia Guo;Yongjun Xu;Qianbin Chen;Wei Zhang","doi":"10.1109/COMST.2024.3361991","DOIUrl":"10.1109/COMST.2024.3361991","url":null,"abstract":"Communication in millimeter wave (mmWave) and even terahertz (THz) frequency bands is ushering in a new era of wireless communications. Beam management, namely initial access and beam tracking, has been recognized as an essential technique to ensure robust mmWave/THz communications, especially for mobile scenarios. However, narrow beams at higher carrier frequency lead to huge beam measurement overhead, which has a negative impact on beam acquisition and tracking. In addition, the beam management process is further complicated by the fluctuation of mmWave/THz channels, the random movement patterns of users, and the dynamic changes in the environment. For mmWave and THz communications toward 6G, we have witnessed a substantial increase in research and industrial attention on artificial intelligence (AI), reconfigurable intelligent surface (RIS), and integrated sensing and communications (ISAC). The introduction of these enabling technologies presents both open opportunities and unique challenges for beam management. In this paper, we present a comprehensive survey on mmWave and THz beam management. Further, we give some insights on technical challenges and future research directions in this promising area.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of Human Activity Recognition Based on Mobile Devices: Overview, Progress and Trends 基于移动设备的人类活动识别系统综述:概述、进展与趋势
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-01-23 DOI: 10.1109/COMST.2024.3357591
Yafeng Yin;Lei Xie;Zhiwei Jiang;Fu Xiao;Jiannong Cao;Sanglu Lu
{"title":"A Systematic Review of Human Activity Recognition Based on Mobile Devices: Overview, Progress and Trends","authors":"Yafeng Yin;Lei Xie;Zhiwei Jiang;Fu Xiao;Jiannong Cao;Sanglu Lu","doi":"10.1109/COMST.2024.3357591","DOIUrl":"10.1109/COMST.2024.3357591","url":null,"abstract":"Due to the ever-growing powers in sensing, computing, communicating and storing, mobile devices (e.g., smartphone, smartwatch, smart glasses) become ubiquitous and an indispensable part of people’s daily life. Until now, mobile devices have been adopted in many applications, e.g., exercise assessment, daily life monitoring, human-computer interactions, user authentication, etc. Among the various applications, Human Activity Recognition (HAR) is the core technology behind them. Specifically, HAR gets the sensor data corresponding to human activities based on the built-in sensors of mobile devices, and then adopts suitable recognition approaches to infer the type of activity based on sensor data. The last two decades have witnessed the ever-increasing research in HAR. However, new challenges and opportunities are emerging, especially for HAR based on mobile devices. Therefore, in this paper, we review the research of HAR based on mobile devices, aiming to advance the following research in this area. Firstly, we give an overview of HAR based on mobile devices, including the general rationales, main components and challenges. Secondly, we review and analyze the research progress of HAR based on mobile devices from each main aspect, including human activities, sensor data, data preprocessing, recognition approaches, evaluation standards and application cases. Finally, we present some promising trends in HAR based on mobile devices for future research.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revolutionizing Future Connectivity: A Contemporary Survey on AI-Empowered Satellite-Based Non-Terrestrial Networks in 6G 革新未来连接:关于 6G 中人工智能驱动的卫星非地面网络的当代调查
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-01-19 DOI: 10.1109/COMST.2023.3347145
Shadab Mahboob;Lingjia Liu
{"title":"Revolutionizing Future Connectivity: A Contemporary Survey on AI-Empowered Satellite-Based Non-Terrestrial Networks in 6G","authors":"Shadab Mahboob;Lingjia Liu","doi":"10.1109/COMST.2023.3347145","DOIUrl":"10.1109/COMST.2023.3347145","url":null,"abstract":"Non-Terrestrial Networks (NTN) are expected to be a critical component of 6th Generation (6G) networks, providing ubiquitous, continuous, and scalable services. Satellites emerge as the primary enabler for NTN, leveraging their extensive coverage, stable orbits, scalability, and adherence to international regulations. However, satellite-based NTN presents unique challenges, including long propagation delay, high Doppler shift, frequent handovers, spectrum sharing complexities, and intricate beam and resource allocation, among others. The integration of NTNs into existing terrestrial networks in 6G introduces a range of novel challenges, including task offloading, network routing, network slicing, and many more. To tackle all these obstacles, this paper proposes Artificial Intelligence (AI) as a promising solution, harnessing its ability to capture intricate correlations among diverse network parameters. We begin by providing a comprehensive background on NTN and AI, highlighting the potential of AI techniques in addressing various NTN challenges. Next, we present an overview of existing works, emphasizing AI as an enabling tool for satellite-based NTN, and explore potential research directions. Furthermore, we discuss ongoing research efforts that aim to enable AI in satellite-based NTN through software-defined implementations, while also discussing the associated challenges. Finally, we conclude by providing insights and recommendations for enabling AI-driven satellite-based NTN in future 6G networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信